Key predictions for 2025 part II: Preparing for the quantum leap

|
As 2025 unfolds, organizations must adapt to transformative shifts in technology, security, and compliance. Key trends include the decline of legacy technology stacks in preparation for post-quantum cryptography, the reduction of TLS certificate lifespans, and stricter revocation policies. These changes demand proactive strategies, automation, and modernization to maintain security and ... Read More

Key trends for 2025 Part I: Postquantum Cryptography

|
In 2025, postquantum cryptography (PQC) will drive major transformations in the PKI space, with announcements of PQC capabilities, adoption of quantum-safe Hardware Security Modules (HSMs), and standardized PQC algorithms in private PKI. Organizations must adapt early to safeguard sensitive data and stay ahead of emerging quantum threats ... Read More

The clock is ticking: NIST’s bold move towards Post-Quantum Cryptography

|
NIST is driving the global transition to post-quantum cryptography, setting a 2030 deadline to deprecate RSA-2048 and ECC-256 algorithms and banning them entirely by 2035. This shift addresses quantum computing's potential to compromise current encryption, emphasizing the need for quantum-resistant solutions to combat risks like "harvest now, decrypt later" attacks ... Read More

How businesses can prepare for the 47-day certificate lifecycle: What it means and recent updates

|
Apple’s proposal to shorten SSL/TLS certificate lifespans to 47 days by 2028 emphasizes enhanced security and automation. Shorter cycles reduce vulnerabilities, encourage automated certificate management, and push businesses to adopt efficient tools like ACME protocols. While the proposal isn’t yet mandatory, businesses must prepare by modernizing infrastructure, automating renewal processes, ... Read More

SSL certificate installation guide

|
SSL/TLS certificates secure digital communication through encryption and authentication, requiring a Certificate Authority (CA) for issuance. Installation involves uploading certificate files and configuring servers, with specific instructions for platforms like Zimbra, Nginx, Tomcat, and more. Prior steps include generating a CSR and choosing the right SSL type, while post-installation actions ... Read More

Apple Releases Draft Ballot to Shorten Certificate Lifespan to 45 Days

|
Earlier this week, on October 9, during the second day of the fall CA/Browser Forum Face-to-Face meeting, Apple revealed that it had published a draft ballot for commentary to GitHub. This proposal, which is sponsored by Sectigo, offers to incrementally phase maximum term for public SSL/TLS certificates down to 45 ... Read More

Multi-Domain vs Wildcard SSL Certificates: Differences & Uses

|
Digital certificates take many forms but they share the same primary goal: to authenticate a website or server's identity. How this is accomplished will depend on the type of certificate and the level of authentication or protection needed ... Read More

Entrust distrust: How to move to a new Certificate Authority

|
Entrust, a once-trusted Certificate Authority (CA), has faced a significant setback as Google and Mozilla have announced they will no longer trust Entrust's SSL/TLS certificates due to security concerns. This move leaves current Entrust customers scrambling to find alternative CAs to ensure secure digital connections. The article emphasizes the urgency ... Read More

S/MIME encryption: What it is and how does it work?

|
Malicious emails form the basis for some of today's most devastating cyberattacks. These attacks are dangerous, in part, due to the inherent simplicity and ubiquity of email. It's easy to see, then, why email often represents a major cybersecurity weak link, even among organizations that otherwise appear to maintain a ... Read More

How much does an SSL certificate cost? Considerations & purchasing process

|
SSL certificates are crucial for website security, encrypting communications between servers and browsers to ensure secure connections. The purchasing process involves selecting a Certificate Authority (CA), choosing the appropriate type of SSL certificate based on validation level (DV, OV, or EV) and coverage (single domain, multi-domain, or wildcard), and completing ... Read More
Loading...